Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

C-Hint: An Effective and Reliable Cache Management for RDMA-Accelerated Key-Value Stores., , , and . SoCC, page 23:1-23:13. ACM, (2014)K-Scope: Online Performance Tracking for Dynamic Cloud Applications., , , and . ICAC, page 29-32. USENIX Association, (2013)Dynamic packet fragmentation for wireless channels with failures., and . MobiHoc, page 73-82. ACM, (2008)The Establishment of Verb Logic and Its Application in Universal Emergency Response Information System Design., and . ICIC (2), volume 5755 of Lecture Notes in Computer Science, page 478-491. Springer, (2009)Transition from Heavy to Light Tails in Retransmission Durations., and . INFOCOM, page 1334-1342. IEEE, (2010)LRU Caching with Dependent Competing Requests., , and . INFOCOM, page 459-467. IEEE, (2018)Is ALOHA Causing Power Law Delays?, and . page 1149-1160. (2007)SparkBench: a spark benchmarking suite characterizing large-scale in-memory data analytics., , , , and . Clust. Comput., 20 (3): 2575-2589 (2017)Two-stage Kernel Bayesian Optimization in High Dimensions., and . UAI, volume 216 of Proceedings of Machine Learning Research, page 2099-2110. PMLR, (2023)Designing Low-Complexity Heavy-Traffic Delay-Optimal Load Balancing Schemes: Theory to Algorithms., , , , and . SIGMETRICS (Abstracts), page 128. ACM, (2018)